Cyber Posture

CVE-2026-7468

High

Published: 30 April 2026

Published
30 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0005 16.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7468 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for logical access to system resources, directly preventing unauthorized remote exploitation of the improper access controls in the vulnerable Demo Site function.

prevent

Defines and limits permitted actions without identification or authentication, mitigating unauthenticated remote access to the exposed /smart-admin-api/druid/index.html endpoint.

prevent

Applies least privilege to restrict access rights, limiting the scope and impact of exploitation even if improper controls are bypassed.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote unauthenticated exploitation of a public-facing web application (smart-admin with exposed Druid endpoint) due to improper access controls, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security vulnerability has been detected in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls. The attack may be initiated remotely. The…

more

exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-7468 is a vulnerability involving improper access controls (CWE-266, CWE-284) in the 1024-lab smart-admin application, affecting versions up to 3.30.0. The issue resides in an unknown function of the file /smart-admin-api/druid/index.html within the Demo Site component.

The vulnerability is exploitable remotely by unauthenticated attackers (AV:N/AC:L/PR:N/UI:N) with low attack complexity and no user interaction required. Exploitation can result in low-level impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), earning a CVSS v3.1 base score of 7.3 (High).

Advisories from VulDB indicate the project was informed early via GitHub issue #117 but has not responded, with no patches or official mitigations available. Security practitioners should monitor the repository at https://github.com/1024-lab/smart-admin/ and related VulDB entries for updates.

The exploit has been publicly disclosed and may be actively used by attackers.

Details

CWE(s)

CVEs Like This One

CVE-2025-2218Shared CWE-266, CWE-284
CVE-2025-0206Shared CWE-266, CWE-284
CVE-2026-5569Shared CWE-266, CWE-284
CVE-2026-5526Shared CWE-266, CWE-284
CVE-2026-2938Shared CWE-266, CWE-284
CVE-2026-4194Shared CWE-266, CWE-284
CVE-2026-2549Shared CWE-266, CWE-284
CVE-2025-2548Shared CWE-266, CWE-284
CVE-2026-1962Shared CWE-266, CWE-284
CVE-2026-4180Shared CWE-266, CWE-284

References